Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Tài liệu Public-Key Cryptography and Key Management doc
Nội dung xem thử
Mô tả chi tiết
J. Wang. Computer Network Security Theory and Practice. Springer 2009
Chapter 3
Public-Key Cryptography
and Key Management
J. Wang. Computer Network Security Theory and Practice. Springer 2009
Why Public-Key Cryptography?
To use data encryption algorithms in network communications,
all parities must first agree on using the same secret keys
Rely on couriers
Set up a meeting to determine a secret key
Use postal service, email service, phone service
…
However, these conventional methods are inflexible for network
communication applications
Public-key cryptography (PKC)
Invented in the 1970’s
Without the need of sharing prior secrets to distribute secret keys
securely
Can also be used for authentication
J. Wang. Computer Network Security Theory and Practice. Springer 2009
Chapter 3 Outline
3.1 Concepts of Public-Key Cryptography
3.2 Elementary Concepts and Theorems in Number
Theory
3.3 Diffie-Hellman Key Exchange
3.4 RSA Cryptosystem
3.5 Elliptic-Curve Cryptography
3.6 Key Distributions and Management